Question

In: Computer Science

My employer has me creating a system and tasked me to select network and access security...

My employer has me creating a system and tasked me to select network and access security controls. I need suggestions and real life examples on which network security controls that I should use and some access control technology for my company which is a local electric company outside of Jackson, MS.

Solutions

Expert Solution

First of all, it is very important to implement network security in order to secure your infrastructure from cyber security threats and risks prevailing over your infrastructure. You need to implement power cyber security so to keep away attackers from attacking your infrastructure. So, here are basic network level security:

  • Firewalls: Firewalls are the basic and most important level of security in your infrastructure. This will block all the unwanted traffics entering into your network and only allow those traffics which are trusted or are written in the allow rules. You can implement firewall both on the network device level as well as on the individual devices.
  • Encryption: Use of encryption in your network will provide huge security to all the data present in your infrastructure. Using encryption tool to encrypt your data will make it difficult for attackers to decode the actual data and thus it will surely make your infrastructure more strong.
  • Multi-Factor Authentication: This is another real-life security that helps in the security process of the network. This multi-factor authentication will authenticate the user to login into the system. This authentication procedure requires authorization based on password or mobile OTP.

These 3 real-life examples will certainly help in providing security to your infrastructure.


Related Solutions

Your company is tasked with creating software for a home security system.
1. Consider the following:Your company is tasked with creating software for a home security system. The software helps manage all the security cameras and devices installed in the house, relays communications between all parties, and provides a “dashboard” mechanism for homeowners and security personnel to access and monitor.Develop 8 to 10 requirements concerning this scenario.2. What is a “recommendation system” and how can it assist in requirements engineering? What tools can be used to assist in requirements gathering?
I am creating a system for a security design and need to choose controls for network...
I am creating a system for a security design and need to choose controls for network security and those with access controls as well. I need to decide what major network security controls I would need to recommend. Which ones are good examples and why? Within that, I need to describe three access control techs. and their essentials for util. apps. Are there a few cases to assist in demonstrating those access control techs.
For Network Access Control and Cloud Security You are required to research and report on this...
For Network Access Control and Cloud Security You are required to research and report on this topic according to the Detail of Question below. A. Select one paper to: Read, understand in order to present three main parts: 1. Summary: o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space! 2. Main points: o The main issues as...
Suggest possible security strategies needed to support encryption and network access control.
Suggest possible security strategies needed to support encryption and network access control.
Network and Security discussion topics: Business Continuity 1. What are the benefits of creating a disaster...
Network and Security discussion topics: Business Continuity 1. What are the benefits of creating a disaster recovery plan? 2. Why is it important to preserve the chain of custody?
Social security system is funded by contributions from both the employee and employer
Social security system is funded by contributions from both the employee and employer
There are a lot of networking and network security jobs and every IT company has network...
There are a lot of networking and network security jobs and every IT company has network engineers, admins, etc. Why and how do think understanding the OSI Model and Network Devices are important from a work standpoint? Looking for some original content.
Computer/Network Security How do you implement write access through web server?
Computer/Network Security How do you implement write access through web server?
Investments Assume you have been tasked with pricing a security. Select a pricing model, which can...
Investments Assume you have been tasked with pricing a security. Select a pricing model, which can be CAPM itself or any multifactor specification, including the Fama French version. Defend your choice of pricing model. If you are specifying a multifactor model, explicitly state the risk factors you would include (e.g., GDP changes, energy prices, etc.)Assume you have been tasked with pricing a security. Select a pricing model, which can be CAPM itself or any multifactor specification, including the Fama French...
Case: Northridge Security Consultants, a security consulting company that specializes in network security for businesses, has...
Case: Northridge Security Consultants, a security consulting company that specializes in network security for businesses, has been using you as an outside contractor to provide research and customer service for their clients. A landscaping business, Sunset Landscapers, has contracted with NSC to help them implement cryptography to protect all documents and transmissions throughout their network. They have over twenty locations nationwide. NSC has found that even though the company would like this technology, the IT Director is resistant to any...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT